메뉴 건너뛰기




Volumn 13, Issue 4, 2009, Pages 401-416

Spiking neural network and wavelets for hiding iris data in digital images

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; CODES (SYMBOLS); DISCRETE WAVELET TRANSFORMS; HAMMING DISTANCE; INTELLIGENT AGENTS; MEDIAN FILTERS; NEURAL NETWORKS; TREES (MATHEMATICS); WATERMARKING;

EID: 55549112855     PISSN: 14327643     EISSN: 14337479     Source Type: Journal    
DOI: 10.1007/s00500-008-0324-x     Document Type: Conference Paper
Times cited : (25)

References (48)
  • 1
    • 41449108152 scopus 로고    scopus 로고
    • A singular-value decomposition-based image watermarking using genetic algorithm
    • Aslantas V (2008) A singular-value decomposition-based image watermarking using genetic algorithm. Int J Electron Commun 62: 386-394
    • (2008) Int J Electron Commun , vol.62 , pp. 386-394
    • Aslantas, V.1
  • 2
    • 0032637701 scopus 로고    scopus 로고
    • Copyright protection for the electronic distribution of text
    • Brassil JT, Low S, Maxemchuk NF (1999) Copyright protection for the electronic distribution of text. Proc IEEE 87(7): 1181-1196
    • (1999) Proc IEEE , vol.87 , Issue.7 , pp. 1181-1196
    • Brassil, J.T.1    Low, S.2    Maxemchuk, N.F.3
  • 3
    • 33645152302 scopus 로고    scopus 로고
    • Lossless watermarking for image authentication: A new framework and an implementation
    • Celik MU, Sharma G, Saber E, Tekalp AM (2006) Lossless watermarking for image authentication: A new framework and an implementation. IEEE Trans Image Process 15: 1042-1049
    • (2006) IEEE Trans Image Process , vol.15 , pp. 1042-1049
    • Celik, M.U.1    Sharma, G.2    Saber, E.3    Tekalp, A.M.4
  • 4
    • 0036611838 scopus 로고    scopus 로고
    • Hierarchical watermarking for secure image authentication with localization
    • Celik MU, Sharma G, Saber E, Tekalp AM (2002) Hierarchical watermarking for secure image authentication with localization. IEEE Trans Image Process 11: 585-595
    • (2002) IEEE Trans Image Process , vol.11 , pp. 585-595
    • Celik, M.U.1    Sharma, G.2    Saber, E.3    Tekalp, A.M.4
  • 5
    • 0036477368 scopus 로고    scopus 로고
    • Robust authentication scheme for protecting copyrights of images and graphics
    • Chang CC, Hwang KF, Hwang MS (2002) Robust authentication scheme for protecting copyrights of images and graphics. IEE Proc Vis Image Signal Process 149: 43-50
    • (2002) IEE Proc Vis Image Signal Process , vol.149 , pp. 43-50
    • Chang, C.C.1    Hwang, K.F.2    Hwang, M.S.3
  • 6
    • 49149097304 scopus 로고    scopus 로고
    • A DWT based approach for image steganography
    • Chen P-Y, Lin H-J (2006) A DWT based approach for image steganography. Int J Appl Sci Eng 4(3): 275-290
    • (2006) Int J Appl Sci Eng , vol.4 , Issue.3 , pp. 275-290
    • Chen, P.-Y.1    Lin, H.-J.2
  • 8
    • 0036488363 scopus 로고    scopus 로고
    • The First 50 Years of Electronic Watermarking
    • Cox IJ, Miller ML (2002) The first 50 years of electronic watermarking. EURASIP JASP 2: 126-132
    • (2002) EURASIP JASP , vol.2 , pp. 126-132
    • Cox, I.J.1    Miller, M.L.2
  • 12
    • 0001219231 scopus 로고
    • Feature Linking via Synchronization among Distributed Assemblies: Simulations of Results from Cat Visual Cortex
    • Eckhorn R, Reitboeck HJ, Arndt M (1990) Feature Linking via Synchronization among Distributed Assemblies: Simulations of Results from Cat Visual Cortex. Neural Comp 2: 293-307
    • (1990) Neural Comp , vol.2 , pp. 293-307
    • Eckhorn, R.1    Reitboeck, H.J.2    Arndt, M.3
  • 13
    • 0032689575 scopus 로고    scopus 로고
    • Neural mechanisms from visual cortex suggest basic circuits for linking field models
    • Eckhorn R (1999) Neural mechanisms from visual cortex suggest basic circuits for linking field models. IEEE Trans Neural Netw 10: 464-479
    • (1999) IEEE Trans Neural Netw , vol.10 , pp. 464-479
    • Eckhorn, R.1
  • 15
    • 0032634857 scopus 로고    scopus 로고
    • Multimedia watermarking techniques
    • Hartung F, Kutter M (1999) Multimedia watermarking techniques. Proc IEEE 87: 1079-1107
    • (1999) Proc IEEE , vol.87 , pp. 1079-1107
    • Hartung, F.1    Kutter, M.2
  • 16
    • 6344227265 scopus 로고    scopus 로고
    • An iris recognition system to enhance E-security environment based on wavelet theory
    • Hassanien AE, Jafar MA (2003) An iris recognition system to enhance E-security environment based on wavelet theory. Adv Model Optim J 5(2): 93-104
    • (2003) Adv Model Optim J , vol.5 , Issue.2 , pp. 93-104
    • Hassanien, A.E.1    Jafar, M.A.2
  • 18
    • 43749098533 scopus 로고    scopus 로고
    • Pulse coupled neural network for detection of masses in digital mammogram
    • Hassanien AE (2006) Pulse coupled neural network for detection of masses in digital mammogram. Neural Netw World J 2/06: 129-141
    • (2006) Neural Netw World J , vol.2 , Issue.6 , pp. 129-141
    • Hassanien, A.E.1
  • 19
    • 33845214650 scopus 로고    scopus 로고
    • Fuzzy-rough hybrid scheme for breast cancer detection
    • Hassanien AE (2007) Fuzzy-rough hybrid scheme for breast cancer detection. Image Comput Vision J 25(2): 172-183
    • (2007) Image Comput Vision J , vol.25 , Issue.2 , pp. 172-183
    • Hassanien, A.E.1
  • 20
    • 33845313940 scopus 로고    scopus 로고
    • An efficient texture segmentation algorithm for isolating Iris pattern based on wavelet theory
    • Helal MA, HassanienAE Taha E-A, Nahla E-H (2004) An efficient texture segmentation algorithm for isolating Iris pattern based on wavelet theory. Int J Pattern Recognit Image Anal 14(1): 97-103
    • (2004) Int J Pattern Recognit Image Anal , vol.14 , Issue.1 , pp. 97-103
    • Helal, M.A.1    Hassanien, A.E.2    Taha, E.-A.3    Nahla, E.-H.4
  • 21
    • 0032785523 scopus 로고    scopus 로고
    • Hidden digital watermarks in images
    • Hsu C-T, Wu J-L (1999) Hidden digital watermarks in images. IEEE Trans Image Process 8(1): 58-68
    • (1999) IEEE Trans Image Process , vol.8 , Issue.1 , pp. 58-68
    • Hsu, C.-T.1    Wu, J.-L.2
  • 27
    • 38949136659 scopus 로고    scopus 로고
    • Adaptive lossless steganographic scheme with centralized difference expansion
    • Leea C-C, Wub H-C, Tsaic C-S, Chud Y-P (2008) Adaptive lossless steganographic scheme with centralized difference expansion. Pattern Recognit 41: 2097-2106
    • (2008) Pattern Recognit , vol.41 , pp. 2097-2106
    • Leea, C.-C.1    Wub, H.-C.2    Tsaic, C.-S.3    Chud, Y.-P.4
  • 28
    • 0024700097 scopus 로고
    • A theory for multi-resolution signal decomposition: The wavelet representation
    • Mallat SG (1989) A theory for multi-resolution signal decomposition: The wavelet representation. IEEE Trans Pattern Anal Mach Intell II(7): 674-693
    • (1989) IEEE Trans Pattern Anal Mach Intell , vol.2 , Issue.7 , pp. 674-693
    • Mallat, S.G.1
  • 32
    • 0029765001 scopus 로고    scopus 로고
    • Copyright protection of images using robust digital signatures
    • In: Atlanta, Georgia, May
    • Nikolaidis N, Pitas I (1996) Copyright protection of images using robust digital signatures. In: Proceedings of ICASSP '96, Atlanta, Georgia, May, pp 2168-2171
    • (1996) Proceedings of ICASSP '96 , pp. 2168-2171
    • Nikolaidis, N.1    Pitas, I.2
  • 34
    • 85032751954 scopus 로고    scopus 로고
    • Watermarking schemes evaluation
    • Petitcolas FAP (2000) Watermarking schemes evaluation. IEEE Signal Process 17(5): 58-64
    • (2000) IEEE Signal Process , vol.17 , Issue.5 , pp. 58-64
    • Petitcolas, F.A.P.1
  • 35
  • 37
    • 3042742327 scopus 로고    scopus 로고
    • Hide and seek: An introduction to steganography
    • Provos N, Honeyman P (2003) Hide and seek: An introduction to steganography. IEEE Secur Priv 1(3): 32-44
    • (2003) IEEE Secur Priv , vol.1 , Issue.3 , pp. 32-44
    • Provos, N.1    Honeyman, P.2
  • 38
    • 0038343934 scopus 로고    scopus 로고
    • Information fusion in biometrics
    • Ross A, Jain A (2003) Information fusion in biometrics. Pattern Recognit Lett 24: 2115-2125
    • (2003) Pattern Recognit Lett , vol.24 , pp. 2115-2125
    • Ross, A.1    Jain, A.2
  • 40
    • 0037237543 scopus 로고    scopus 로고
    • A note on wavelets and diffusions
    • Shen J (2003) A note on wavelets and diffusions. J Comp Anal Appl 5: 147-159
    • (2003) J Comp Anal Appl , vol.5 , pp. 147-159
    • Shen, J.1
  • 41
    • 0036474718 scopus 로고    scopus 로고
    • A Wavelet-based watermarking algorithm for ownership verification of digital images
    • Wang Y, Doherty JF, Van Dyck RE (2002) A Wavelet-based watermarking algorithm for ownership verification of digital images. IEEE Trans Image Process 11(2): 77-88
    • (2002) IEEE Trans Image Process , vol.11 , Issue.2 , pp. 77-88
    • Wang, Y.1    Doherty, J.F.2    Van Dyck, R.E.3
  • 42
    • 0030387424 scopus 로고    scopus 로고
    • A watermark for digital images
    • Wolfgang RB, Delp EJ (1996) A watermark for digital images. Proc ICIP' 96(3): 219-222
    • (1996) Proc ICIP' , vol.96 , Issue.3 , pp. 219-222
    • Wolfgang, R.B.1    Delp, E.J.2
  • 43
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • Wong PW, Memon N (2001) Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans Image Process 10(10): 1593-1601
    • (2001) IEEE Trans Image Process , vol.10 , Issue.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2
  • 44
    • 0032312612 scopus 로고    scopus 로고
    • A public key watermark for image verification and authentication
    • Wong PW (1998) A public key watermark for image verification and authentication. IEEE Int Conf Image Process 1: 455-459
    • (1998) IEEE Int Conf Image Process , vol.1 , pp. 455-459
    • Wong, P.W.1
  • 46
    • 42749096863 scopus 로고    scopus 로고
    • Inverted pattern approach to improve image quality of information hiding by LSB substitution
    • Accessed 9 Feb 2008
    • Yang C-H (2008) Inverted pattern approach to improve image quality of information hiding by LSB substitution. Pattern Recognit. http:// www.sciencedirect.co. Accessed 9 Feb 2008
    • (2008) Pattern Recognit
    • Yang, C.-H.1
  • 47
    • 11844253853 scopus 로고    scopus 로고
    • Steganography using multiple-base notational system and human vision sensitivity
    • Zhang X, Wang S (2005) Steganography using multiple-base notational system and human vision sensitivity. IEEE Signal Process Lett 12: 67-70
    • (2005) IEEE Signal Process Lett , vol.12 , pp. 67-70
    • Zhang, X.1    Wang, S.2
  • 48
    • 43849108605 scopus 로고    scopus 로고
    • The upper and lower bounds of the information-hiding capacity of digital images
    • doi: 10.1016/j.ins.2008.03.011
    • Zhang F, Pan Z, Cao K, Zheng F, Wu F (2008) The upper and lower bounds of the information-hiding capacity of digital images. Inform Sci. doi: 10.1016/j.ins.2008.03.011
    • (2008) Inform Sci
    • Zhang, F.1    Pan, Z.2    Cao, K.3    Zheng, F.4    Wu, F.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.